alert tcp $EXTERNAL_NET any -> $HOME_NET 53 (msg:"ET TROJAN APT 41 LOWKEY Backdoor - Initalisation Bytes Received from CnC?"; flow:established,from_server; content:"|FF FF 01 00 00 01 00 00 00 00 00 00|"; depth:12; metadata: former_category MALWARE; reference:url,www.fireeye.com/blog/threat-research/2019/10/lowkey-hunting-for-the-missing-volume-serial-id.html; classtype:trojan-activity; sid:2028863; rev:2; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_and_Server, deployment Perimeter, tag APT41, signature_severity Major, created_at 2019_10_16, malware_family LOWKEY, performance_impact Low, updated_at 2019_10_16;)

Added 2019-10-17 20:10:51 UTC


Topic revision: r1 - 2019-10-18 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats